• II. METHODS
  • “ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR
  • Konferensiyasi




    Download 1.48 Mb.
    Pdf ko'rish
    bet9/36
    Sana22.07.2023
    Hajmi1.48 Mb.
    #77142
    1   ...   5   6   7   8   9   10   11   12   ...   36
    Bog'liq
    63ed0704130b8 19 respublika ilmiy onlayn 10-TA
    шахриёр диссертация, МАЖМУА 2022-23, 1-qoldirilgan dars maruza, Лабаротория № 2, togri javoblar, Erkinov Muhammadali, fizika 2 mavzu 10, KATTA ASHULA VA UNING IJROCHILIK ANANALARI, Sobirjon KURS ISHI, 3-topshiriq, IQTISODIYOTDA AXBOROT-KOMMUNIKATSIYA TEXNOLOGIYALAR VA TIZIMLAR
    I. INTRODUCTION 
    The protection system should be continuous, planned, centralized, targeted, accurate, 
    reliable, comprehensive, easy to upgrade and quick to change appearance. It usually needs 
    to be effective in all extreme conditions. 
    In organizations with a small amount of information, it is advisable and effective to 
    use simple methods of data protection. For example, the segregation and masking of 
    readable securities and electronic documents, the appointment and training of staff working 
    with these documents, the organization of security of the building, the obligation not to 
    distribute valuable information to employees, control over visitors, computer use the 
    simplest methods of protection, and so on. Usually, the simplest methods of protection work 
    best. 
    II. METHODS 
    In organizations with complex content, a large number of automated information 
    systems and large amounts of information, a comprehensive system of protection of 
    information is created. However, this method and simple methods of protection should not 
    interfere with the work of employees. 
    The complexity of the protection system is achieved by the presence of legal, 
    organizational, engineering, technical and software-mathematical elements. The proportions 
    of the elements and their content ensure the uniqueness of the information security system 
    of the organization and its uniqueness and difficulty of breaking. 
    A real system can be thought of as made up of many different elements. The content of 
    the elements of the system depends not only on its specificity, but also on the value of the 
    information and determines the level of protection set, taking into account the value of the 
    system. 


    “ZAMONAVIY TA‟LIM TIZIMINI RIVOJLANTIRISH VA UNGA QARATILGAN KREATIV G‟OYALAR, 

    Download 1.48 Mb.
    1   ...   5   6   7   8   9   10   11   12   ...   36




    Download 1.48 Mb.
    Pdf ko'rish